1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Internet
Designed using a layered architecture.
Physical Layer
Handles the physical wires and 'to/from' addresses.
Computing Device
Any machine that can run a program (Smart fridge, sensor, laptop).
Path
The sequence of directly connected computing devices that begins at the sender and ends at the receiver.
Routing
The process of finding a path. It is not predetermined.
Redundancy
Having multiple paths between two devices. If we have n paths, the system is Fault Tolerant.
IP (Internet Protocol)
The fundamental addressing system.
IPv4
Uses 32 bits (2^32 addresses).
IPv6
Uses 128 bits (2^128 addresses).
TCP (Transmission Control Protocol)
Breaks data into packets, numbers the packets, reassembles them at the end, and sends an Acknowledgement (ACK) back to the sender.
UDP (User Datagram Protocol)
Sends packets without checking for errors or order. It is 'Best Effort' delivery.
HTTP/HTTPS
The protocol for the World Wide Web. HTTPS uses TLS/SSL to encrypt the connection.
Cybersecurity
The protection of computer systems and networks.
Malware
Any software intended to damage or disable computers.
Virus
A malicious program that requires human action to spread.
Worm
Similar to a virus, but it self-replicates and spreads across networks automatically.
Trojan Horse
A program that looks useful but hides a malicious payload inside.
Ransomware
Encrypts a user's files and demands payment to unlock them.
Spyware
Secretly monitors user activity.
Phishing
Using social engineering to trick people into giving up PII.
DDoS (Distributed Denial of Service)
An attacker uses a Botnet to flood a server with requests until it crashes.
Man-in-the-Middle (MitM)
An attacker intercepts communication between two parties to steal data.
Symmetric Encryption
One secret key for both encryption and decryption.
Asymmetric (Public Key) Encryption
Two keys (Public and Private) used for secure communication.
Certificate Authority (CA)
Organizations that issue Digital Certificates to prove website authenticity.
Multi-Factor Authentication (MFA)
Requiring two or more pieces of evidence to log in.
Digital Divide
The gap in access to tech due to various factors.
Net Neutrality
The principle that ISPs must treat all data equally.
Copyright
Ownership of a creative work.
Creative Commons
A license that lets you share your work with specific rules.
Open Source
Software where the source code is public.
Open Access
Making research/journals free to the public.
Bit Rate
The speed at which a system can transmit bits.
Metadata
Data about data.
Algorithmic Bias
When a program creates unfair outcomes.